Sciweavers

367 search results - page 19 / 74
» Implementing P3P Using Database Technology
Sort
View
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
RSKT
2007
Springer
14 years 1 months ago
ROSA: An Algebra for Rough Spatial Objects in Databases
Abstract. A fundamental data modeling problem in geographical information systems and spatial database systems refers to an appropriate treatment of the vagueness or indeterminacy ...
Markus Schneider, Alejandro Pauly
SEMWEB
2009
Springer
14 years 2 days ago
DOGMA: A Disk-Oriented Graph Matching Algorithm for RDF Databases
RDF is an increasingly important paradigm for the representation of information on the Web. As RDF databases increase in size to approach tens of millions of triples, and as sophis...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
DAWAK
2000
Springer
13 years 12 months ago
Applying Vertical Fragmentation Techniques in Logical Design of Multidimensional Databases
In the context of multidimensional databases implemented on relational DBMSs through star schemes, the most effective technique to enhance performances consists of materializing re...
Matteo Golfarelli, Dario Maio, Stefano Rizzi
WWW
2005
ACM
14 years 8 months ago
Data versioning techniques for internet transaction management
An Internet transaction is a transaction that involves communication over the Internet using standard Internet protocols such as HTTPS. Such transactions are widely used in Intern...
Ramkrishna Chatterjee, Gopalan Arun